Practical Schemes for Smooth MAC Layer Handoff in Wireless Networks

Size: px
Start display at page:

Download "Practical Schemes for Smooth MAC Layer Handoff in 802.11 Wireless Networks"

Transcription

1 Practical Schemes for Smooth MAC Layer Handoff in 8.11 Wireless Networks Yong Liao, Lixin Gao University of Massachusetts Department of Electrical and Computer Engineering Amherst, Massachusetts 13, USA {yliao, Technical Report: TR-6-CSE-3 Feb, 6 Abstract The limited service range of the access points demands mobile wireless stations to handoff frequently between different cells in the IEEE 8.11 infrastructure networks. However, the handoff scheme used in the current 8.11 infrastructure networks is far from graceful. In this paper, we propose a smooth MAC layer handoff scheme and a greedy smooth MAC layer handoff scheme. Our handoff schemes scan channels in a smooth manner so that the handoff can have less impact on upper layer applications. In order to limit the frequency of channel scanning, an adaptive mechanism is used to dynamically adjust the threshold triggering the channel scanning operation. We have implemented our handoff schemes using commodity 8.11 devices and extensive experiments have been conducted to evaluate the performance. The experimental results demonstrate that our schemes reduce packet delay and loss during handoff. Our handoff schemes are implemented in the client side only and do not require changes to access points. Therefore, our schemes can be deployed in the existing 8.11 wireless networks. 1 Introduction Over the past few years, numerous 8.11-based wireless networks have been deployed in campuses, hotels, airports and companies. Besides providing convenient access to the Internet, 8.11 wireless networks have sufficient bandwidth to support various promising applications such as VoIP. However, the small service range of the access points (AP) makes mobile wireless stations frequently handoff between different cells. Previous studies have shown that the handoff latency can be several hundred milliseconds, which is too long for real-time applications such as VoIP or video streaming. Therefore, an efficient handoff scheme is critical to ensure that multimedia applications can be deployed in 8.11 wireless networks. Existing measurements have shown that the channel scanning phase is the most time consuming phase in handoff. It contributes as much as 9% to the entire handoff latency[6]. During handoff, all incoming and outgoing frames are dropped. Previous works propose to scan less channels to reduce the handoff latency [] [3] [5]. In one approach, the wireless station figures out which channels may have working APs and scans only those channels. The other approach is the AP reports its neighboring APs to the wireless station. We choose to implement the handoff on the

2 client side and not to make any change to the AP side. So our schemes can be deployed in the existing 8.11 wireless networks. From the point of view of applications, we can generalize the goal of improving handoff as minimizing the handoff s impact on applications. Most active scan handoff schemes focus on making handoff fast by reducing the number of scanned channels as well as the duration of scanning a channel. We observe that besides making the handoff fast, there is another way to improve the handoff process. We can break the long duration discovery phase into several pieces. By this means, there is not a long transmission interuption, so the handoff will be smooth and graceful and the upper layer applications may even not notice the handoff occurs. We propose a handoff scheme, smooth handoff, in which the scan channel phase is splitted into multiple subphases. The wireless station can use the interval between two consecutive subphases to send and receive data frames. Obviously, this can reduce packet delay and jitter during the channel scanning phase, which is important for time critical applications as VoIP. If the wireless station s available queue buffer size is small, our scheme can efficiently reduce packet loss as well. We further extend the smooth handoff into a greedy smooth handoff scheme. The later scheme not only scans channel smoothly but also reduces the number of channels being scanned. We have implemented our handoff schemes using commodity 8.11b devices. Extensive experiments and measurements have been conducted to evaluate their performance. In order to assess the impact on applications, we had experiments to test our handoff schemes in the context of realtime voice traffic transmission and TCP file transmission. The results demonstrate that our handoff schemes are far more imperceptible to applications than the existing handoff scheme used in 8.11 networks. The rest of this paper is organized as follows. In section we introduce the background of IEEE 8.11b/g standard and previous works on MAC layer handoff. Section 3 presents the details of our handoff schemes. Section 4 describes the implementation issues. In Section 5 we present the experimental evaluation. Section 6 concludes this paper. Background and Related Work.1 Background of IEEE 8.11b/g Wireless LAN Standard There are three main variants of 8.11 standard, designated by the letters b, g and a. In this paper, we present our handoff schemes in the context of 8.11b/g since the majority of existing WLANs use 8.11b/g. The 8.11b/g networks operate in the.4ghz unregulated spectrum, which is further divided into 11 partly overlapped channels. Among the 11 channels, channel 1, channel 6, and channel 11 are the maximum number of channels that are not overlapping in spectrum. The 8.11b/g wireless networks are usually organized in the infrastructure mode, in which the system is subdivided into cells. Each cell has a central controller called the access point (AP). The AP acts as the bridge between the wired and the wireless world. There is a mechanism defined in the 8.11b/g standard for measuring the RF energy. The numeric value of measured signal quality is an integer with a range of 55 (1-byte value), which is called the Receive Signal Strength Indicator (RSSI). The standard also provides a layer- handoff process that allows the station to associate with a new AP, if the current AP s RSSI drops below a threshold. The 8.11b/g standard provides a set of functions for the MAC layer handoff, such as the active/passive scan, the authentication process, and the reassociation process. The layer- handoff usually lasts several hundred milliseconds. During handoff, the wireless card cannot send or receive data frames, because the card does not work on the same channel of its current AP.

3 In active scan, the wireless station broadcasts a Probe Request frame on one channel after contending to the medium and starts a Probe Timer. If no activity is detected in the wireless media when the Probe Timer reaches MinChannelTime, the station believes that no AP is working in that channel and it should scan another channel. If the station detects that the channel is not idle, it will wait for Probe Response frames from working APs until the Probe Timer reaches MaxChannelTime. An empirical measurement shows that MinChannelTime is about ms, and MaxChannelTime is about 4ms [6]. Passive scan can be used to discover nearby APs as well. The 8.11b/g APs can periodically broadcast beacon frames to announce their presence. To discover working APs on one channel, the wireless station should switch to that channel and waits for the beacon frames from APs. The default beacon generating interval is 1ms. It takes 1ms 11 1 second to discover all APs woking in 11 channels. Since passive scan always has longer latency than active scan, most of the current wireless cards use active scan to probe available APs [7]. The handoff procedure can be divided into three phases, discovery phase, authentication phase, and reassociation phase. Corresponding to the three phases, the entire handoff latency consists of three components: probe delay, authentication delay, and reassociation delay. Among all operations in handoff process, the discovery phase contributes as much as 9% to the overall handoff latency [6]. The authentication and reassociation usually take only a few milliseconds to finish 1. Therefore, the most efficient way to improve the handoff is to change the discovery phase.. Related Work Previous studies on reducing the handoff latency fall into two categories: the active scan based methods and the passive scan based methods...1 Active Scan Handoff We use full scan handoff to denote the original active handoff scheme of the wireless card, which scans all channels consecutively in the discovery phase. Most improvements to the active scan handoff strive to scan less channels. This is called as selective scan handoff. Obviously, if the wireless station knows which channels have working APs, it probes only those channels. The 8.11k standard introduces Neighbor Report, which makes selective scan a reality. But we could not expect the existing networks will switch to 8.11k in the near future. The authors of [] propose a MAC layer fast handoff. They use selective scan and record the scan results in the AP cache for future use. When a wireless station moves to a location visited before, it knows which channels have APs by checking the AP cache. Only those channels and channel 1, 6, and 11 will be scanned. But in the case of cache miss or incorrect cached information, the handoff latency is the same as that of the full scan handoff. In [3], each AP, instead of the wireless stations, record the neighboring APs information in the neighbor graph data structure. Then the AP can inform wireless stations about which channels have neighboring APs. The wireless stations need to scan only those channels. Besides, wireless stations need not wait until Max Channel Time if all neighboring APs response frames have already arrived. To construct and maintain the neighbor graph, all APs have to upgrade their firmwares, which makes this scheme not easy to deploy because of the large number of existing 8.11b/g networks. 1 We assume that all APs use open system authentication, which is the default setting for most vendors APs. The authentication delay might be the major part of the handoff latency if more sophisicated authentication process is used.

4 In [5] the authors propose a fast scan handoff scheme. Instead of broadcasting the probe request frame to all APs, wireless station might be interested in some specific APs. The probe request frame is sent to a specific AP who will be the sole responder. The designated AP sends probe response frame after SIFS deferral. By this means, a wireless station waits for probe response for only a few microseconds (a SIFS duration). Because this scheme needs to change both the wireless stations and the APs, it cannot be deployed in the existing 8.11 networks... Passive Scan Handoff The second category of previously proposed handoff scheme strives to improve the performance of passive scan. The authors of [4] propose a MAC layer handoff called SyncScan. It assumes all APs working on the same channel are synchronized and broadcast beacon frames almost at the same time. Wireless station switches to the particular channel at the time when beacon frames are broadcasted. The actual time used to listen on each channel can be very short, because the wireless station exactly knows when the APs will announce themselves. But it may be difficult to synchronize the beacon frame broadcast of all APs in large scale wireless networks. Handoff Begin Send & Receive Data Frames... Send & Receive Data Frames Authentication Phase Handoff End Channel Scanning... Channel Scanning Channel Scanning Association Phase Figure 1: Operation of smooth MAC layer handoff time 3 Smooth MAC Layer Handoff Schemes Different from previous works, we mainly focus on scanning channels in a different manner, instead of scanning less channels. 3.1 Smooth Handoff In existing active scan handoff schemes, the channels are scanned one after another without interuption. There is an several hundred milliseconds interruption during which the wireless station cannot send and receive any data frame. In our smooth handoff scheme, the 11 channels are divided into groups. Instead of consecutively scanning all channels, after one group of channels are scanned, the wireless station takes a break from the channel scanning operation and switches back to normal data transmission mode. After working in the normal mode for some time, the wireless station switches to the channel scanning mode again and discovers APs working on another group of channels. After all channels are scanned, the wireless station knows all APs working on 11 channels. Then it can choose one AP with good signal quality to associate with. Figure 1 shows the operation of our smooth handoff scheme. The total time it takes for scanning all channels is so long that the handoff is far from imperceptible to users. In our scheme, the scanning operation is divided into multiple subphases and there is sufficient time left for transmitting data frames between two subphases. Therefore, packet delay jitter will be smaller. Although the total time needed to scan all channels in a smooth handoff is the same as that of the full scan handoff, our scheme can still reduce packet loss during handoff in some cases. We will explain this issue in details at section 3.3.

5 Having multiple channel scanning subphases means a longer discovery phase before actually switching to another AP. So the discovery phase in our smooth handoff scheme should start earlier than that of the standard 8.11b/g handoff. In the 8.11b/g infrastructure network, there are usually overlapping areas between neighboring cells. Ideally, the discovery phase starts when wireless station enters an overlapping area and it should finish before the wireless station leaves the overlapping area. We limit the scenario of deploying our smooth handoff scheme in the wireless networks where there is enough overlapping area between two neighboring cells, e.g. the wireless networks deployed in the indoor environment. The wireless station has sufficient time to scan channels if it moves in a modest speed. For example, the ordinary walking speed of human being is about 1.5m/s. If the discovery phase takes s to finish, the client moves about 3m ahead. Usually, the overlapping area between two 8.11b/g APs should be far more than 3m. We will describe the AP deployment requirements in section 3.4. In the standard handoff of the current 8.11b/g networks, the wireless station does not have to discover another AP before losing connection with its current AP, i.e. the RSSI of the current AP drops to a very low threshold. In our smooth handoff scheme, the wireless station needs to start the discovery phase earlier than the standard handoff scheme. In order to do so, we use a higher threshold to trigger the discovery phase, to make sure the wireless station has enough time to scan channels gracefully. Using a high threshold (denoted by T hres) to trigger the discovery phase may lead to more scan operations when the wireless station moves to a place where all available APs RSSI is lower than T hres, such as near the network periphery. To limit the frequency of scanning channels, we adopt an adaptive algorithm to dynamically change the threshold triggering the discovery phase. Initially the wireless station uses a high threshold. It starts to probe for nearby APs when the current AP s RSSI is lower than the threshold T hres. After scanning all channels, it turns out that all available APs RSSI is below the high threshold. Then the threshold is adjusted to a lower level (the threshold should be decreased by α). When the wireless station successfully finds an AP with good signal quality to associate with, the threshold should be increased by β, with the expectation to find a better signal quality AP. The threshold should be bounded by a maximum and a minimum value, denoted by T hres max and T hres min. This is to prevent the wireless station from scanning channel too aggressively or not doing handoff even the current AP s signal quality is poor. When the threshold drops to T hres min, the signal quality of current AP is too poor to make successful transmission. The wireless station needs to find another AP as soon as possible, so a full scan should be scheduled. Figure shows the pseudocode of the smooth handoff algorithm. 3. Greedy Smooth Handoff To shorten the discovery phase in handoff, we can scan channels both smoothly and selectively. That is, we adopt selective scan in our smooth handoff scheme. We call this handoff algorithm Greedy Smooth Handoff. In the discovery phase of the greedy smooth handoff, after the wireless station scans a group of channels and finds a suitable AP, it connects to that AP without scanning the remaining channels. If no suitable AP is discovered, the wireless station continues scanning the next group of channels. The threshold should also be adjusted as described in the previous section. How to arrange channels into groups is the challenge here. Ideally, the channels that are likely to have working APs should be put into the first group to be scanned. Some apriori information is needed to properly arrange channels into groups. For example, the neighboring APs of an AP working on channel 1 may usually work on channel 6 or channel 11, considering that there are only 3 noninterference channels in 8.11b/g. Even if the wireless station randomly arranges the

6 Smooth Handoff Algorithm 1: while(true) { : sample the RSSI of current AP; 3: if(rssi < T hres ) { 4: if(t hres > T hres min ) { 5: for(each group i) { 6: scan channels in group i; 7: sleep for some time; 8: } 9: } else { 1: scan all channels consecutively; 11: } 1: choose AP with the best RSSI; 13: if(rssi new > T hres min && (RSSI new RSSI > )) { 14: associate with the chosen AP; 15: T hres = min(t hres max, T hres + β); 16: } else { 17: T hres = max(t hres min, T hres α); 18: } 19: } : } Figure : Smooth handoff algorithm channels into groups, on average, only 6 channels are needed to be scanned before discovering a suitable AP. 3.3 Benefits of Smooth Handoff Schemes An obvious benefit of our smooth handoff schemes is that the packet delay and jitter during handoff will be smaller than that of the standard handoff, since the wireless station can still intermittently transmit packet during the discovery phase. When a station sends out frames, the application layer writes the data into a buffer of the OS kernel and then the data are written to a buffer on the wireless card. The buffer in the OS kernel and the onboard buffer of the card can be modeled as one queue. Before the discovery phase starts, because the current AP s signal quality is too poor to have successful transmission or the transmission rate drops to a low level, the queue is almost full of backlog packets. Therefore, the available queue buffer is usually very small at the beginning of the discovery phase. In the standard handoff, the wireless card cannot send and receive any data frame for several hundred milliseconds. Packets generated by applications can overflow the queue, and therefore packet loss occurs. Generally, packet loss during handoff depends on the available queue buffer size and packet generating rate of the applications. We consider only the client side here. If the available queue buffer size is large enough to cache all packets generated during handoff, there is no packet loss in handoff. In this case, our smooth handoffs can reduce delay jitter only. If the available queue buffer size is small, which is quite likely to be true at the beginning of the discovery phase, our smooth

7 handoff has smaller packet loss than the full scan handoff does. Suppose P packets are generated during a full scan handoff and the available queue buffer size is C. The discovery phase is divided into N subphases in the smooth handoff. We use L and L to denote the number of lost packets during full scan handoff and smooth handoff. When the queue buffer is too small to cache all the packets generated in each subphase, N C packets are buffered and sent out later in the smooth handoff, while the full scan handoff can buffer only C packets. The smooth handoff has (N 1)C less lost packets than the full scan handoff does. If the queue buffer can cache all packets in each subphase, there is no packet loss in smooth handoff, while P C packets are lost in full scan handoff. If the queue buffer can cache all packets during the full scan handoff, there is no packet loss in smooth handoff and full scan handoff. The improvement of the smooth handoff in terms of packet loss is shown in (1). Since the greedy smooth handoff scans less channels than the smooth handoff, it can be expected that the packet loss can be further reduced. (N 1)C (C P L L N ) = P C ( P N < C P ) (1) (C > P ) A side-effect of more packets being buffered in the smooth handoff is that more packets will be delayed during handoff. We use D and D to denote the number of delayed packets in smooth handoff and full scan handoff. It can be derived that D D has the same expression as (1). Although more packets are delayed in the smooth handoff, the latency is much shorter than that of the full scan handoff. In general, the latency is proportional to the duration of a full scan (denoted by T seconds) in full scan handoff. Our smooth handoff can reduce the latency to T N, since the wireless station has a chance to transmit packets every T N seconds during handoff. Figure 3 shows an example of what happens during handoff. A box in Figure 3 represents a frame. For simplicity, we assume the queue buffer can cache one frame. When the queue is full, new arriving frames are droppped. We also assume frames are generated in a constant rate, i.e. one frame is generated every time unit. We consider the discovery phase only since it is the most time consuming operation in handoff. Figure 3(a) shows an example of full scan handoff. The discovery phase starts after the fifth frame is generated. For the 6 frames generated during handoff (frame 6 11), only frame 6 is buffered and sent out when handoff completes. The handoff loses 5 frames and delays one frame by 5 time units. In the smooth handoff shown in Figure 3(b), the entire discovery phase is divided into 3 subphases and one subphase uses time units. After frame 4 is sent out, the wireless station starts to scan a group of channels, which causes frame 5 to be buffered and frame 6 to be dropped. Then the wireless station stops scanning channels for time units and the backlog frame 5 is sent out, followed by newly generated frames. We should note that frame 7 and frame 8 have almost no delay, because frame 5 is immediately sent out when the wireless station stops scanning channel. The transmission delay can be ignored when the frame is small. The entire smooth handoff loses 3 frame and delays 3 frames by one time unit. 3.4 Station Movement and AP Deployment Constraints Each hexagon in Figure 4 represents the cell of one AP. The solid circle represents where AP s RSSI is T hres min. The wireless station will disconnect with its current AP if moving out of the solid circle. T hres min is determined by the sensitivity of the radio module on wireless card. Once the T hres min is fixed, the solid circle s radius, R, is determined by the transmission power of AP and the propagation of radio signals. We can consider R as a constant once the network

8 ^ + + +!" )*, %-&!"##$ %&('! ).*%/, %-& (a) Full scan handoff M"; G I C >; C >; C >; >? N >F>; GH OF N :; <==>? :; <==>? :; <==>? P >QA>FR> /9 "1 / 3 "4 5 E >F?:GH G EI <<H JLKGF?<C C E >F? :GH G /4 "5 M; G I > P >F?/OF <AH N P >QA>FR> (b) Smooth handoff Figure 3: How queue buffer affects packet loss and delay in handoff RSSI = Thres max RSSI = Thres min \ X ] V SUTYX SUTWV _ ` \ V a SUT[Z 3 r ] X Figure 4: Overlapping areas between neighboring cells

9 is deployed. The dashed circle s radius is r, representing where AP s RSSI is T hres max. The relationship between AP s RSSI and the distance to the AP L is: RSSI = C, where k is the L k factor contributing to the attenuation of signal propagation and C is related with the transmission power of the AP. We have equation () for r: { T hresmin = C R T hresmin k T hres max = C r = R k () r T hres k max T max GroupNum BreakT ime+ ChannelNum MaxChannelT ime (3) Let T max denote the maximum duration of discovery phase. T max depends on the number of channel scanning subphases, the duration of data transmission after each subphase, the number of channels, and the time needed to scan one channel, as shown in (3). Users may configure those parameters according to their requirements when deploying the networks. Intuitively, if T hres max is set to a higher value, the discovery phase will start earlier (r is smaller). Then V max can be higher if T max is a fixed value. V max < d = R r (4) T max T max From () and (4) we can derive the limitation of wireless station s moving speed as(5). ( V max < R ) T hresmin 1 k T max T hres max Another constraint is that there should be an AP with better signal quality when the station finishes scanning channels. From Figure 4, we can see that in order to ensure the wireless station enters another AP s dashed circle when it moves out of its current AP s dashed circle, the three neighboring dashed circles should have at least one overlapping point. Let D denote the distance between neighboring APs, we can derive that D 3r. After replacing r with (), we have the following constraint on the distance between two neighboring APs: D 3R k T hresmin T hres max (6) There are two kinds of movements that cause handoff. The first one is moving in the middle of the network, like from point a 1 to a in Figure 4. In this case, the wireless station can always have enough time to smoothly scan channels and find another AP with good signal, if the moving speed and neighboring APs distance are limited by (5) and (6) respectively. The second kind of movement is at the border of the network, where all nearby APs have poor signal quality, e.g., moving from point b 1 to b in Figure 4. In this situation, the threshold T hres should be adjusted to a low value (lower than T hres max ). Otherwise the wireless station will keep scanning channels because all nearby APs have RSSI lower than T hres max. (5) 4 Implementation We have implemented full scan handoff, smooth handoff and greedy smooth handoff by software. The full scan handoff is used to emulate the handoff controlled by the wireless card firmware.

10 Table 1: Default values in implementation Parameters RSSI Value T hres max 15 T hres min 5 α 5 β The station is equipped with a 8.11b PCMCIA card using the Intersil Prism chipsets. The HostAP driver [1] is used to drive the wireless card. The HostAP driver has a manual scan and roam mode, in which both channel scanning and AP selection are left to users. A 16 bits Channel Mask controls which channels should be scanned during handoff. We had some modifications to the HostAP driver so user can make an ioctl() system call to set the Channel Mask. A user space daemon, handoffd, implements the function of handoff. It monitors the current AP s signal quality and starts the discovery phase when the current AP s RSSI is low. To avoid the ping-pong effect, the wireless station only attempts to associate with the new AP when condition (7) holds. This is similar to the scheme specified in [13]. After scanning channels, the handoffd daemon chooses one AP to associate with. { RSSInewAP T hres (7) RSSI newap RSSI oldap > Table 1 shows the default value of parameters in the implementation. T hres min = 5 and = are the values used by the firmware of our wireless card. T hres min is the minimum RSSI value that the wireless card can transmit data frames. T hres max = 15 is an empirical value derived from experiment. We will explain the reason for choosing this value in section The α parameter is set to 5, therefore the threshold will be adjusted to the same value as the firmware-based handoff after two unsuccessful channel-scanning. We set β to be equal to in our implementation, because the RSSI of the new AP is at least higher than previous AP s RSSI after one successful handoff. 5 Experimental Evaluation We use a testbed network and an existing network deployed in a three-floor building in our experiments. The later one is used to test our handoff schemes in a large network with various signal coverage conditions. We have tested the scenario that the wireless station moves to places where all nearby APs signal quality is poor and the threshold adjusting function is activated. 5.1 Testbed Setup Figure 5 shows the testbed network. The two APs on the left side work on channel 6. The AP and AP 4 on the right side work on channel 11. The left-side APs are far away from the right-side ones. The wireless station needs to do handoff when moving between them. Figure 6 shows the RSSI of AP 1 and AP when the wireless station moves from left to the right. This network has the main feature of the cellular network infrastructure, i.e. the wireless station can always make a choice between two candidate APs after the discovery phase. Open authentication is used for

11 Campus Network Remote Host AP3 Gateway AP4 AP1 Switch Wireless Station AP Figure 5: The testbed network layer- authentication. The power saving mode is disabled during the experiments. So the AP will not cache frames destined to the wireless station. 5 4 AP1 RSSI AP RSSI RSSI Position (m) Figure 6: The RSSI disribution All APs and the gateway machine are connected to a high speed ethernet switch. The gateway connects the testbed network with the campus network. A laptop equipped with a LinkSys WPC 11 PCMCIA card is the mobile station. The driver is our modified version of HostAP..5, compiled for Linux kernel.4.6. We configure the group size to be 1 in our handoff schemes. In the following experiments, we do not deliberately choose the order in which the channels are scanned. Instead, our handoff schemes scan channels in the order of channel 1, channel, channel 3, and so on. This is the worst case scenario for the greedy smooth handoff scheme, since we do not use any apriori information to order the channels being scanned. Between two scan subphases, there is a 5ms interval left for the wireless station to send and receive data frames. Considering MaxChannelT ime is about 4ms and the switching channel overhead is a few milliseconds, it takes about 5ms to scan one channel. If we set group size to 1, the duration of the discovery phase in our smooth handoff is about 11 (5ms + 5ms) 1.1s.

12 Number of Loss Number of Loss (a) Full scan handoff (b) Smooth handoff Number of Loss Number of Loss (c) Greedy smooth handoff (d) Firmware-based handoff Figure 7: Packet loss in different handoff schemes (channel group size is 1 in smooth handoff and greed smooth handoff schemes)

13 5. Delay & Loss Measurement The purpose of this experiment is to evaluate the performance of different handoff schemes in terms of packet loss and delay. The wireless station sends out an ICMP echo request message to the gateway machine every 5 milliseconds. When an echo reply message from the gateway arrives at the wireless station, the arrival time and the message sequence number are recorded. The packet delay is half of the round trip time. The gap between the sequence numbers of two successively arriving echo reply messages indicates the number of lost packets. We have conducted the experiments of full scan handoff, smooth handoff, and greedy smooth handoff. There are two handoffs in each experiment and we use the same threshold to trigger the discovery phase. We will first discuss one typical experiment instance for each handoff scheme. Then the average exprimental results are presented in Table. The experimental results of the automatic handoff by the wireless card firmware are also presented, although it is unfair to compare the software-based handoff schemes with the firmwarebased handoff, since the software implementation always has more overheads. Delay (msec) Delay (msec) (a) Full scan handoff (b) Smooth handoff Delay (msec) Delay (msec) (c) Greedy smooth handoff (d) Firmware-based handoff Figure 8: Packet delay in different handoff schemes (channel group size is 1 in smooth handoff and greed smooth handoff schemes)

14 5..1 Full Scan Handoff In this experiment, the handoffd daemon samples the current AP s RSSI. If the RSSI is lower than threshold T hres, the wireless station uses a consecutive full scan to discover all nearby working APs. Figure 7(a) and Figure 8(a) plot the packet loss and delay. We can see that the loss and delay demonstrate a burst characteristic during handoff. This is because the wireless card scans all channels without interuption, it cannot send or receive any data frame for a long time. During handoff, the maximum delay can be 35ms and there are 6 delayed packets during the two handoffs. Forty packets are lost and all of them are consecutive losses. The maximum consecutive loss is 1 packets. When there is no handoff, most packets have delay less than 5ms and no packet loss occurs. 5.. Smooth Handoff In our smooth handoff, a high threshold is used to proactively start the discovery phase. The thresholds in full scan handoff and smooth handoff are set to the same value (T hres max = 15), in order to compare them in the same scenario. We scan one channel in each subphase to fully demonstrate the feature of our smooth handoff. Figure 7(b) and 8(b) plot the results in this experiment. Both packet loss and delay are less than those in the full scan handoff experiment. There are only 4 packets lost and the maximum latency is less than 4ms. Thirty-five packets are delayed during two handoffs. Our smooth handoff has more delayed packets than the full scan handoff, which is consistent with our analysis in Section 3.3. Table : Average results of different handoff experiments Total Lost Max Burst Max Scheme Packet Packet Loss Delay Full Scan ms Smooth ms Greedy ms Firmware ms 5..3 Greedy Smooth Handoff Figure 7(c) and 8(c) show the results of one experiment instance. As the greedy smooth handoff scans less channels than the smooth handoff, there are 3 delayed packets, which is less than that in smooth handoff experiment. The number of lost packets here is 3 and the maximum delay observed in this experiment is about 4ms. There are less delayed packets during the handoff at 4s than the handoff at 9s in Figure 8(c). That is because one access point in this experiment works on channel 6 and the other one works on channel 11. Only 6 channels are scanned during the first handoff. For the second handoff, all 11 channels are scanned before the station discovers the AP working on channel 11.

15 5..4 Firmware-based Handoff Firmware-based handoff is the original handoff controlled by the wireless card firmware. It can be deemed as the hardware implementation of the full scan handoff algorithm. Figure 7(d) and 8(d) plot the results of one experiment. The packet delay can be more than 1ms when handoff occurs. There are 1 packets lost and 9 packets are delayed during the two handoffs. We can also see that there are 6 individual losses before a consecutive 4 packets loss in the first handoff. The 6 individual lost packets represent that the current AP s signal quality has degraded, but the wireless station still connects to that AP. The 4 consecutive lost packets represent the period when the wireless station is doing handoff Comparison of Handoff Schemes The above experiments have been repeated for 1 times and Table shows the average results. We can see from Table that the smooth handoff and greedy smooth handoff can significantly reduce the accumulative packet loss and the consecutive packet loss. The full scan handoff is used to emulate the firmware-based handoff. They both probe channels continuously, so packet delay and loss demonstrate the same pattern. The firmware-based scheme has better performance than the full scan handoff because hardware solution has less overhead than software solution. Therefore, it can be expected that if our handoff schemes are implemented by hardware, the packet loss and delay can be further reduced. Table 3: Packet losses during handoff in voice traffice experiment Handoff Full Scan Smooth Greedy Firmware losses VoIP Traffic Experiment This experiment is to evaluate performance of our handoff schemes for audio stream traffic. We use sniffer tools to capture all the UDP packets from the the speaker to the listener in a 1 seconds VoIP session generated by the NetMeeting software. We replay the captured packets in this experiment when using four handoff schemes alternately. A wired machine connected to the campus network is the receiver, as shown in Figure 5. We consider the situation that the wireless station is a speaker and the wired station is a listener. The wired station records the interarrival time of all UDP packets. The packet interarrival time in each experiment is plotted in Figure 9. The vertical dashed lines in those figures indicate when handoffs occur. The average number of packet losses is shown in Table 3. The maximum packet interarrival time in the full scan handoff experiment is about 7ms. That is to say the handoff causes about one second silence period in the VoIP session. While Figure 9(b) and Figure 9(c) show that the smooth handoff and the greedy handoff do not cause much additional fluctuation to the packet interarrival time. Only or 3 packets are lost during handoff, as we can see from Table 3. Figure 9(d) plots packet interarrival time in the firmware-based handoff. We can see that it shows the same pattern as the full scan handoff experiment.

16 Time(ms) Packet No. Time(ms) Packet No. (a) Full scan handoff (b) Smooth handoff Time(ms) Packet No. Time(ms) Packet No. (c) Greedy smooth handoff (d) Firmware-based handoff Figure 9: Packet interarrival time in VoIP experiment for different handoff schemes (channel group size is 1 in smooth handoff and greed smooth handoff)

17 5.4 TCP Transmission Experiment We use the same network configuration as shown in Figure 5. The remote station is a FTP server connected on campus network. The wireless station downloads or uploads a 35M binary file from the FTP server. In each experiment there are two handoffs. Figure 1 shows the normalized number of packets received by the wireless station as a function of time in the FTP download experiment. We can see that both the full scan handoff and the firmware-based handoff have considerable impact on the goodput. For the full scan handoff experiment, almost no packet arrives at the wireless station from 18s to s, since during that time the wireless station is doing handoff. The corresponding period in the firmware-based handoff is from 38s to 4s. For the firmware-based handoff, the period from 5s to 38s represents the AP cling effort, i.e. the wireless station does not try to associate with another AP even the current AP s signal quality is poor and no packet can be transmitted. As we can see from Figure 1, the curves for smooth handoff and greedy smooth handoff experiments are more closer to linear functions. The handoffs cause the FTP download speed dropping for only a short time. Figure 11 plots the normalized number of packets sent out by the wireless station in the FTP upload experiments. Both figures show that our handoff schemes have less impact on the TCP-based FTP application. 1 1 Number of packets arrived Smooth Handoff. Greedy Smooth Handoff Firmware-based Handoff Full Scan Handoff Number of packets arrived Smooth Handoff. Greedy Smooth Handoff Firmware-based Handoff Full Scan Handoff Figure 1: Download experiment Figure 11: Upload experiment 5.5 Effect of Algorithm Parameters Thresholds Triggering Discovery Phase To proactively start the discovery phase in our handoff schemes, a high RSSI threshold is used to trigger the discovery phase. This experiment is to demonstrate how the T hres max parameter affects the performance of our handoff schemes. The wireless station generates ICMP echo request messages to the gateway machine and records the reflected echo reply messages. The packet generating rate is one packet every 5ms. We set T hres max to four different RSSI value, 5, 1, 15, and. Figure 1(a) plots the packet losses when using RSSI = 5 as the T hres max. We can see that more packet are lost when using a low threshold, because even the wireless station has the chance to transmit data frames between two channel scanning operations, the signal quality of its current AP is too poor to make successful transmissions. As shown in Figure 1(b), there can be only one or two losses during each handoff when using RSSI = 15 as the threshold. Our experiment shows that using threshold higher than 15 does not result in significant less packet losses and delay.

18 Packet loss (a) T hres = 5 Packet loss (b) T hres = 15 Figure 1: Packet loss in different threshold experiments We have conducted this experiment for 1 times. Table 4 shows the average number of packet losses in handoff when setting T hres max to different values. The threshold can greatly affect the performance of our handoff schemes. In order to have the full advantage of our handoff schemes, we should use a high threshold to make sure that the discovery phase is proactively started. Table 4: Average packet losses in different thresholds experiments Handoff T hres T hres T hres T hres Scheme = 5 = 1 =15 = Smooth Greedy Channel Group Size As discussed in Section 3.3, both packet delay and loss depends the number of channel scanning subphases, which is determined by the channel group size. This experiment is to demonstrate the impact of group size to the performance of our handoff schemes. The wireless station still sends out ICMP echo request messages to the gateway machine and records the echo reply messages. We measure the packet loss and delay when the group size is set to 1,, 5, and 11. The results are plotted in Figure 13(a) and Figure 13(b). We can see that the larger the group size, the more packets will be lost and the longer the packet delay will be, which is consistent to what we have discussed before. 5.6 Accommodating Mobility in Large Area Besides the testbed network, we have also conducted experiments in a large wireless network, where some areas are not well covered by APs. When the wireless station moves to those areas, the adaptive mechanism adjusts the threshold to a low value to prevent the station from keeping scanning channels. The wireless network used in this experiment is deployed in a three-floor building.

19 Packet loss Group Size Packet delay (ms) Group Size (a) loss (b) delay Figure 13: Packet loss and delay in different group size experiments East West AP31 AP3 The Third Floor AP33 AP34 AP1 AP The Second Floor AP3 AP4 AP11 AP1 The First Floor AP13 AP14 Figure 14: Network topology and the moving trace

20 There are 1 APs in this network, four on each floor of the building. The four APs in the same floor are installed in the ceiling of a sixty-meter corridor, with two on the east side and two on the west side. Figure 14 shows the network topology and the moving trace of the wireless station. Figure 15 shows the packet loss when wireless station uses the original firmware-based handoff. In this experiment, packet loss burst happens 7 times, which indicates 7 handoffs. Figure 16(a) plots the packet loss in the smooth handoff experiment when the threshold adjustment is disabled by setting α = β =. From this figure we see that the first handoff, the fourth one, and the sixth one have more packet losses. That is because wireless station has moved to the stairwells in the east and west sides of the building, where are not well covered by the wireless network. In those areas, since all nearby APs have RSSI value less than the high threshold, the wireless station had multiple channel scanning operations before finding an AP with good signal quality. Those scan operations can cause additional packet losses. Figure 16(b) shows the packet loss in a smooth handoff experiment with the threshold adjustment. The threshold adjusting mechanism changes the threshold to a low value when all nearby APs have poor signal quality. Therefore, even in those areas which are not so well covered by APs, our smooth handoff scheme does not cause more packet losses comparing with the handoff occurring in the well covered areas. Packet loss Figure 15: Packet loss in firmware handoff 6 Conclusions In this paper we propose a smooth MAC layer handoff scheme and a greedy smooth MAC layer handoff scheme. Our handoff schemes split the time for discovering APs into multiple subphases. So the station can use the interval between subphases to send and receive data frames. To prevent the station from keeping scanning channels when it moves within the areas which are not well covered by APs, an adaptive algorithm is adopted to dynamically adjust the threshold triggering the handoff. Our handoff schemes are staightforward and easy to deploy. They do not require any change to the AP side. We have implemented our handoff schemes using commodity 8.11 devices. Experimental results show that our handoff schemes have considerable improvements in terms of packet delay and loss. They can effectively make the handoff imperceptible to applications.

21 Packet loss Packet loss (a) without threshold adjustment (b) with threshold adjustment Figure 16: Comparison of packet losses when adjusting the threshold or not References [1] IEEE Computer Society LAN MAN standards Committee, IEEE Standard for Information Technology: Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, [] S. Shin, A. Forte, A. Rawat, and H. Schulzrinne, Reducing MAC Layer Handoff Latency in IEEE 8.11 Wireless LANs, in Proceedings of the second international workshop on Mobility management and wireless access protocols, Philadelphia, PA, USA, 4. [3] M. Shin, A. Mishra, W. A. Arbaugh, Improving the Latency of 8.11 Hand-offs using Neighbor Graphs, in Processings of the ACM MobiSys Conference, Boston, MA, USA, June 4. [4] I. Ramani, and S. Savage, SyncScan: Practical Fast Handoff for 8.11 Infrastructure Networks, in Proceedings of the IEEE Infocom Conference 5, Miami, FL, March 5. [5] Moo Ryong Jeong, Fujio Watanabe, Toshiro Kawahara, Fast Active Scan for Measurement and Handoff,, Do- CoMo USA Labs, Contribution to IEEE 8, May 3. [6] A. Mishra, M. Shin, and W. Arbaugh, An Empirical Analysis of the IEEE 8.11 MAC Layer Handoff Proces, ACM Computer Communications Review, vol. 33, no., Apr. 3. [7] H. Velayos and G. Karlsson, Techniques to Reduce IEEE 8.11b MAC Layer Handover Time, KunglTekniska Hogskolen, Stockholm, Sweden, Tech. Rep. TRITA-IMIT-LCN R 3:, ISSN , ISRN KTH/IMIT/LCN/R-3/.SE, April 3. [8] International Telecommunication Union. General Characteristics of International Telephone Connections and International Telphone Circuits. ITU-TG.114, [9] Jean Tourrilhes, Wireless LAN resources for Linux, Tourrilhes/Linux/Wireless.html [1] Host AP driver for Intersil Prism/.5/3 and WPA Supplicant. [11] Recommended Practice for Multi-Vendor Access Point Interoperability via an Inter-Access Point Protocol Across Distribution Systems Supporting IEEE 8.11 Operation, IEEE Std 8.11F-3, June 3. [1] Medium Access Control (MAC) Security Enhancements, IEEE Std 8.11i-4, July 4.

22 [13] Lucent Technologies Inc., Roaming with WaveLAN/IEEE 8.11, Technical Report WaveLAN Technical Bulletin 3/A, November [14] R. Shirodkar, J. Kabara, and P. Krishnamurthy, A QoS-based Indoor Wireless Data Network Design for VoIP Applications, in proceedings of IEEE International Vehicular Technology Conference, Atlantic City, NJ, Fall 1. [15] N. Jordan, R. Fleck, C. Ploninger, Fast Handover Support in Wireless LAN based Networks, In Proceeding of the Fifth IFIP-TC6 International Conference on Mobile and Wireless Communications Networks (MWCN 3) p.: 49-5, ISBN: , Singapore, October 3. [16] A. Weyland, G. Stattenberger, and T. Braun, User-Controlled Handover in Wirless LANs, IEEE Workshop on Applications and Services in Wireless Networks (ASWN ), Paris, France, July 3-5,.

Multichannel Virtual Access Points for Seamless Handoffs in IEEE 802.11 Wireless Networks

Multichannel Virtual Access Points for Seamless Handoffs in IEEE 802.11 Wireless Networks Multichannel Virtual Access Points for Seamless Handoffs in IEEE 8. Wireless Networks Maria Eugenia Berezin, Franck Rousseau, Andrzej Duda Grenoble Institute of Technology, CNRS Grenoble Informatics Laboratory

More information

Scanning Delays in 802.11 Networks

Scanning Delays in 802.11 Networks Scanning Delays in 802.11 Networks David Murray Murdoch University D.Murray@murdoch.edu.au Michael Dixon Murdoch University M.Dixon@murdoch.edu.au Terry Koziniec Murdoch University T.Koziniec@murdoch.edu.au

More information

Mobility Management Technique for Real Time Traffic in 802.11 Networks

Mobility Management Technique for Real Time Traffic in 802.11 Networks Journal of Computer Science 3 (6): 390-398, 2007 ISSN 1549-3636 2007 Science Publications Mobility Management Technique for Real Time Traffic in 802.11 Networks 1 Gurpal Singh, 1 Ajay Pal Singh Atwal and

More information

A Neighborhood Awareness Method for Handoff Assistance in 802.11 Wireless Networks

A Neighborhood Awareness Method for Handoff Assistance in 802.11 Wireless Networks A Neighborhood Awareness Method for Handoff Assistance in 802.11 Wireless Networks Gurpal Singh *, Ajay Pal Singh Atwal ** and B.S. Sohi *** * Deptt of CSE & IT, BBSBEC, Fatehgarh Sahib, Punjab, India,

More information

DeuceScan: Deuce-Based Fast Handoff Scheme in IEEE 802.11 Wireless Networks

DeuceScan: Deuce-Based Fast Handoff Scheme in IEEE 802.11 Wireless Networks : Deuce-Based Fast Handoff Scheme in IEEE 82.11 Wireless Networks Yuh-Shyan Chen, Chung-Kai Chen, and Ming-Chin Chuang Department of Computer Science and Information Engineering National Chung Cheng University,

More information

Reducing MAC Layer Handoff Latency in IEEE 802.11 Wireless LANs

Reducing MAC Layer Handoff Latency in IEEE 802.11 Wireless LANs Reducing MAC Layer Handoff Latency in IEEE 80211 Wireless LANs Sangho Shin Andrea G Forte Columbia University {ss2020,andreaf}@cscolumbiaedu Anshuman Singh Rawat New York University asr245@nyuedu Henning

More information

SyncScan: Practical Fast Handoff for 802.11 Infrastructure Networks

SyncScan: Practical Fast Handoff for 802.11 Infrastructure Networks SyncScan: Practical Fast Handoff for 82.11 Infrastructure Networks Ishwar Ramani and Stefan Savage Department of Computer Science & Engineering University of California, San Diego Abstract Wireless access

More information

SELECTIVE ACTIVE SCANNING FOR FAST HANDOFF IN WLAN USING SENSOR NETWORKS

SELECTIVE ACTIVE SCANNING FOR FAST HANDOFF IN WLAN USING SENSOR NETWORKS SELECTIVE ACTIVE SCANNING FOR FAST HANDOFF IN WLAN USING SENSOR NETWORKS Sonia Waharte, Kevin Ritzenthaler and Raouf Boutaba University of Waterloo, School of Computer Science 00, University Avenue West,

More information

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit

More information

Cooperative Handoff in Wireless Networks

Cooperative Handoff in Wireless Networks Cooperative Handoff in Wireless Networks George Athanasiou, Thanasis Korakis and Leandros Tassiulas Dept. of Computer and Communications Engineering, University of Thessaly, Greece Email: gathanas@uth.gr

More information

Seamless Handover of Streamed Video over UDP between Wireless LANs

Seamless Handover of Streamed Video over UDP between Wireless LANs Seamless Handover of Streamed Video over UDP between Wireless LANs Ger Cunningham, Seán Murphy, Liam Murphy Department of Computer Science University College Dublin Dublin, Ireland {ger.munningham,liam.murphy@ucd.ie,

More information

Final for ECE374 05/06/13 Solution!!

Final for ECE374 05/06/13 Solution!! 1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -

More information

Analysis of Effect of Handoff on Audio Streaming in VOIP Networks

Analysis of Effect of Handoff on Audio Streaming in VOIP Networks Beyond Limits... Volume: 2 Issue: 1 International Journal Of Advance Innovations, Thoughts & Ideas Analysis of Effect of Handoff on Audio Streaming in VOIP Networks Shivani Koul* shivanikoul2@gmail.com

More information

Analysis of QoS parameters of VOIP calls over Wireless Local Area Networks

Analysis of QoS parameters of VOIP calls over Wireless Local Area Networks Analysis of QoS parameters of VOIP calls over Wireless Local Area Networks Ayman Wazwaz, Computer Engineering Department, Palestine Polytechnic University, Hebron, Palestine, aymanw@ppu.edu Duaa sweity

More information

How To Analyze The Security On An Ipa Wireless Sensor Network

How To Analyze The Security On An Ipa Wireless Sensor Network Throughput Analysis of WEP Security in Ad Hoc Sensor Networks Mohammad Saleh and Iyad Al Khatib iitc Stockholm, Sweden {mohsaleh, iyad}@iitc.se ABSTRACT This paper presents a performance investigation

More information

Using Smart Triggers for Improved User Performance in 802.11 Wireless Networks

Using Smart Triggers for Improved User Performance in 802.11 Wireless Networks Using Smart Triggers for Improved User Performance in 802.11 Wireless Networks Vivek Mhatre Intel Research, Cambridge, UK vivek.p.mhatre@intel.com Konstantina Papagiannaki Intel Research, Cambridge, UK

More information

An Empirical Analysis of the IEEE 802.11 MAC Layer Handoff Process

An Empirical Analysis of the IEEE 802.11 MAC Layer Handoff Process An Empirical Analysis of the IEEE 802.11 MAC Layer Handoff Process Arunesh Mishra Dept of Computer Science University of Maryland College Park, MD, USA arunesh@cs.umd.edu Minho Shin Dept of Computer Science

More information

Virtual Access Points

Virtual Access Points Virtual Access Points Performance Impacts in an 802.11 environment and Alternative Solutions to overcome the problems By Thenu Kittappa Engineer Author: Thenu Kittappa Page 1 Virtual Access Points... 1

More information

Transport Layer Protocols

Transport Layer Protocols Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements

More information

CSMA/CA. Information Networks p. 1

CSMA/CA. Information Networks p. 1 Information Networks p. 1 CSMA/CA IEEE 802.11 standard for WLAN defines a distributed coordination function (DCF) for sharing access to the medium based on the CSMA/CA protocol Collision detection is not

More information

Chapter 7 Low-Speed Wireless Local Area Networks

Chapter 7 Low-Speed Wireless Local Area Networks Wireless# Guide to Wireless Communications 7-1 Chapter 7 Low-Speed Wireless Local Area Networks At a Glance Instructor s Manual Table of Contents Overview Objectives s Quick Quizzes Class Discussion Topics

More information

Lab Exercise 802.11. Objective. Requirements. Step 1: Fetch a Trace

Lab Exercise 802.11. Objective. Requirements. Step 1: Fetch a Trace Lab Exercise 802.11 Objective To explore the physical layer, link layer, and management functions of 802.11. It is widely used to wireless connect mobile devices to the Internet, and covered in 4.4 of

More information

TECHNICAL NOTE. GoFree WIFI-1 web interface settings. Revision Comment Author Date 0.0a First release James Zhang 10/09/2012

TECHNICAL NOTE. GoFree WIFI-1 web interface settings. Revision Comment Author Date 0.0a First release James Zhang 10/09/2012 TECHNICAL NOTE GoFree WIFI-1 web interface settings Revision Comment Author Date 0.0a First release James Zhang 10/09/2012 1/14 Web interface settings under admin mode Figure 1: web interface admin log

More information

Testing a Wireless LAN

Testing a Wireless LAN Chapter 17 Testing a Wireless LAN This chapter will introduce you to: Wireless LAN Testing Considerations Signal Coverage Testing Performance Testing In-Motion Testing Security Vulnerability Testing Acceptance/Verification

More information

Wireless LAN Concepts

Wireless LAN Concepts Wireless LAN Concepts Wireless LAN technology is becoming increasingly popular for a wide variety of applications. After evaluating the technology, most users are convinced of its reliability, satisfied

More information

CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE 802.11 Wireless Local Area Networks (WLANs)

CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE 802.11 Wireless Local Area Networks (WLANs) CS6956: Wireless and Mobile Networks Lecture Notes: //05 IEEE 80. Wireless Local Area Networks (WLANs) CSMA/CD Carrier Sense Multi Access/Collision Detection detects collision and retransmits, no acknowledgement,

More information

Dynamic Load Balance Algorithm (DLBA) for IEEE 802.11 Wireless LAN

Dynamic Load Balance Algorithm (DLBA) for IEEE 802.11 Wireless LAN Tamkang Journal of Science and Engineering, vol. 2, No. 1 pp. 45-52 (1999) 45 Dynamic Load Balance Algorithm () for IEEE 802.11 Wireless LAN Shiann-Tsong Sheu and Chih-Chiang Wu Department of Electrical

More information

Mobility Management Advanced

Mobility Management Advanced Mobility Management Advanced Summer Semester 2011 Integrated Communication Systems Group Ilmenau University of Technology Outline Motivation Mobility Management Approaches in the TCP/IP Reference Model

More information

Wireless Local Area Networks (WLANs)

Wireless Local Area Networks (WLANs) 4 Wireless Local Area Networks (WLANs) Contents Overview...................................................... 4-3 Configuration Options: Normal Versus Advanced Mode.............. 4-4 Normal Mode Configuration..................................

More information

Continuous network discovery using Opportunistic Scanning

Continuous network discovery using Opportunistic Scanning Continuous network discovery using Opportunistic Scanning Authors: Date: 2009-11-17 Slide 1 Abstract This presentation is in response to WNG requesting more information on the capability of 802.11 to support

More information

Basic processes in IEEE802.11 networks

Basic processes in IEEE802.11 networks Module contents IEEE 802.11 Terminology IEEE 802.11 MAC Frames Basic processes in IEEE802.11 networks Configuration parameters.11 Architect. 1 IEEE 802.11 Terminology Station (STA) Architecture: Device

More information

A study of the discovery process in 802.11 networks

A study of the discovery process in 802.11 networks A study of the discovery process in 82.11 networks German Castignani, Andres Emilio Arcia Moret, Nicolas Montavont To cite this version: German Castignani, Andres Emilio Arcia Moret, Nicolas Montavont.

More information

Wiereless LAN 802.11

Wiereless LAN 802.11 Tomasz Kurzawa Wiereless LAN 802.11 Introduction The 802.11 Architecture Channels and Associations The 802.11 MAC Protocol The 802.11 Frame Introduction Wireless LANs are most important access networks

More information

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006 CSE331: Introduction to Networks and Security Lecture 6 Fall 2006 Open Systems Interconnection (OSI) End Host Application Reference model not actual implementation. Transmits messages (e.g. FTP or HTTP)

More information

Demystifying Wi-Fi Roaming

Demystifying Wi-Fi Roaming EDUCATIONAL BRIEF Demystifying Wi-Fi Roaming What You Need to Know to Avoid Costly Mistakes A wide variety of modern conveniences are made possible through Wi-Fi Networking. Home automation, real-time

More information

ECE 358: Computer Networks. Homework #3. Chapter 5 and 6 Review Questions 1

ECE 358: Computer Networks. Homework #3. Chapter 5 and 6 Review Questions 1 ECE 358: Computer Networks Homework #3 Chapter 5 and 6 Review Questions 1 Chapter 5: The Link Layer P26. Let's consider the operation of a learning switch in the context of a network in which 6 nodes labeled

More information

A Short Look on Power Saving Mechanisms in the Wireless LAN Standard Draft IEEE 802.11

A Short Look on Power Saving Mechanisms in the Wireless LAN Standard Draft IEEE 802.11 A Short Look on Power Saving Mechanisms in the Wireless LAN Standard Draft IEEE 802.11 Christian Röhl, Hagen Woesner, Adam Wolisz * Technical University Berlin Telecommunication Networks Group {roehl,

More information

D-Scan: Enabling Fast and Smooth Handoffs in AP-dense 802.11 Wireless Networks

D-Scan: Enabling Fast and Smooth Handoffs in AP-dense 802.11 Wireless Networks D-Scan: Enabling Fast and Smooth Handoffs in AP-dense 802.11 Wireless Networks Jin Teng, Changqing Xu Shanghai Jiao Tong University Shanghai, China {kenteng, cqxu}@sjtu.edu.cn Weijia Jia City University

More information

DIRAC: A Software-based Wireless Router System Petros Zerfos, Gary Zhong, Jerry Cheng, Haiyun Luo, Songwu Lu, Jefferey Jia-Ru Li

DIRAC: A Software-based Wireless Router System Petros Zerfos, Gary Zhong, Jerry Cheng, Haiyun Luo, Songwu Lu, Jefferey Jia-Ru Li DIRAC: A Software-based Wireless Router System Petros Zerfos, Gary Zhong, Jerry Cheng, Haiyun Luo, Songwu Lu, Jefferey Jia-Ru Li Presented by: Stephen Kazmierczak Overview Background Issues Motivation

More information

How To Monitor And Test An Ethernet Network On A Computer Or Network Card

How To Monitor And Test An Ethernet Network On A Computer Or Network Card 3. MONITORING AND TESTING THE ETHERNET NETWORK 3.1 Introduction The following parameters are covered by the Ethernet performance metrics: Latency (delay) the amount of time required for a frame to travel

More information

Improving Throughput Performance of the IEEE 802.11 MAC Layer Using Congestion Control Methods

Improving Throughput Performance of the IEEE 802.11 MAC Layer Using Congestion Control Methods Improving Throughput Performance of the IEEE 802.11 MAC Layer Using Congestion Control Methods Song Ci CS Department University of Michigan-Flint Flint, MI48502 cisong@umich.edu Guevara Noubir College

More information

Wireless Technologies for the 450 MHz band

Wireless Technologies for the 450 MHz band Wireless Technologies for the 450 MHz band By CDG 450 Connectivity Special Interest Group (450 SIG) September 2013 1. Introduction Fast uptake of Machine- to Machine (M2M) applications and an installed

More information

Low Latency Handover in IEEE 802.11g Wireless LANs

Low Latency Handover in IEEE 802.11g Wireless LANs Low Latency Handover in IEEE 8.11g Wireless LANs Mads Kronborg Agesen, Peter Dalgaard Hansen, Michael Hansen, Søren Brun Madsen and Hans Jørgen Uggerhøj Section for Automation and Control Department of

More information

Performance Measurement of Wireless LAN Using Open Source

Performance Measurement of Wireless LAN Using Open Source Performance Measurement of Wireless LAN Using Open Source Vipin M Wireless Communication Research Group AU KBC Research Centre http://comm.au-kbc.org/ 1 Overview General Network Why Network Performance

More information

On the Selection of Scanning Parameters in IEEE 802.11 Networks

On the Selection of Scanning Parameters in IEEE 802.11 Networks On the Selection of Scanning Parameters in IEEE 82. Networks Nicolas Montavont, Andrés Arcia-Moret and German Castignani IMT/Telecom Bretagne, Irisa, nicolas.montavont@telecom-bretagne.eu T/ICT4D Lab,

More information

Measure wireless network performance using testing tool iperf

Measure wireless network performance using testing tool iperf Measure wireless network performance using testing tool iperf By Lisa Phifer, SearchNetworking.com Many companies are upgrading their wireless networks to 802.11n for better throughput, reach, and reliability,

More information

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software Local Area What s a LAN? A transmission system, usually private owned, very speedy and secure, covering a geographical area in the range of kilometres, comprising a shared transmission medium and a set

More information

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages Part I: The problem specifications NTNU The Norwegian University of Science and Technology Department of Telematics Note! The problem set consists of two parts: Part I: The problem specifications pages

More information

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji

More information

FORTH-ICS / TR-375 March 2006. Experimental Evaluation of QoS Features in WiFi Multimedia (WMM)

FORTH-ICS / TR-375 March 2006. Experimental Evaluation of QoS Features in WiFi Multimedia (WMM) FORTH-ICS / TR-375 March 26 Experimental Evaluation of QoS Features in WiFi Multimedia (WMM) Vasilios A. Siris 1 and George Stamatakis 1 Abstract We investigate the operation and performance of WMM (WiFi

More information

Eliminating handoff latencies in 802.11 WLANs using Multiple Radios: Applications, Experience, and Evaluation

Eliminating handoff latencies in 802.11 WLANs using Multiple Radios: Applications, Experience, and Evaluation Eliminating handoff latencies in 82.11 WLANs using Multiple Radios: Applications, Experience, and Evaluation Vladimir Brik, Arunesh Mishra, Suman Banerjee Abstract Deployment of Voice-over IP (VoIP) and

More information

Performance monitoring and analysis of wireless communication protocols for mobile devices

Performance monitoring and analysis of wireless communication protocols for mobile devices Performance monitoring and analysis of wireless communication protocols for mobile devices Almudena Díaz, Pedro Merino, F. Javier Rivas Departamento de Lenguajes y Ciencias de la Computación, University

More information

Department of Computer Science Columbia University

Department of Computer Science Columbia University Towards the Quality of Service for VoIP traffic in IEEE 82.11 Wireless Networks Sangho Shin Henning Schulzrinne Email: sangho, hgs@cs.columbia.edu Department of Computer Science Columbia University 28

More information

RF Monitor and its Uses

RF Monitor and its Uses RF Monitor and its Uses Pradipta De prade@cs.sunysb.edu Outline RF Monitoring Basics RF Monitoring Installation Using RF Monitoring RF Monitoring on WRT54GS Extending RF Monitoring UDP Lite Comments on

More information

Wave Relay System and General Project Details

Wave Relay System and General Project Details Wave Relay System and General Project Details Wave Relay System Provides seamless multi-hop connectivity Operates at layer 2 of networking stack Seamless bridging Emulates a wired switch over the wireless

More information

Nokia Siemens Networks. CPEi-lte 7212. User Manual

Nokia Siemens Networks. CPEi-lte 7212. User Manual Nokia Siemens Networks CPEi-lte 7212 User Manual Contents Chapter 1: CPEi-lte 7212 User Guide Overview... 1-1 Powerful Features in a Single Unit... 1-2 Front of the CPEi-lte 7212... 1-2 Back of the CPEi-lte

More information

Copyright 2014 Luxul. All rights reserved. All trademarks and registered trademarks are property of respective holders.

Copyright 2014 Luxul. All rights reserved. All trademarks and registered trademarks are property of respective holders. Copyright 2014 Luxul. All rights reserved. All trademarks and registered trademarks are property of respective holders. Things you need to know about Wi-Fi Roaming to avoid Costly Mistakes Martin Boulter,

More information

QoS issues in Voice over IP

QoS issues in Voice over IP COMP9333 Advance Computer Networks Mini Conference QoS issues in Voice over IP Student ID: 3058224 Student ID: 3043237 Student ID: 3036281 Student ID: 3025715 QoS issues in Voice over IP Abstract: This

More information

This chapter covers the following topics: Characteristics of roaming Layer 2 roaming Layer 3 roaming and an introduction to Mobile IP

This chapter covers the following topics: Characteristics of roaming Layer 2 roaming Layer 3 roaming and an introduction to Mobile IP This chapter covers the following topics: Characteristics of roaming Layer 2 roaming Layer 3 roaming and an introduction to Mobile IP C H A P T E R 5 Mobility This book covers the major components of 802.11

More information

MEASURING WIRELESS NETWORK CONNECTION QUALITY

MEASURING WIRELESS NETWORK CONNECTION QUALITY Technical Disclosure Commons Defensive Publications Series January 27, 2016 MEASURING WIRELESS NETWORK CONNECTION QUALITY Mike Mu Avery Pennarun Follow this and additional works at: http://www.tdcommons.org/dpubs_series

More information

Handover Management based on the Number of Retries for VoIP on WLANs

Handover Management based on the Number of Retries for VoIP on WLANs Handover Management based on the Number of Retries for VoIP on WLANs Shigeru Kashihara Yuji Oie Department of Computer Science and Electronics, Kyushu Institute of Technology Kawazu 68-4, Iizuka, 82-852

More information

CELL BREATHING FOR LOAD BALANCING IN WIRELESS LAN

CELL BREATHING FOR LOAD BALANCING IN WIRELESS LAN International Journal of Wireless Communications and Networking 3(1), 2011, pp. 21-25 CELL BREATHING FOR LOAD BALANCING IN WIRELESS LAN R. Latha and S. Radhakrishnan Rajalakshmi Engineering College, Thandalam,

More information

Wireless LAN 802.11g USB Adapter

Wireless LAN 802.11g USB Adapter Wireless LAN 802.11g USB Adapter User s Guide Version 1.0 User s Guide 0 Copyright statement No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by

More information

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.

More information

Performance Analysis of the IEEE 802.11 Wireless LAN Standard 1

Performance Analysis of the IEEE 802.11 Wireless LAN Standard 1 Performance Analysis of the IEEE. Wireless LAN Standard C. Sweet Performance Analysis of the IEEE. Wireless LAN Standard Craig Sweet and Deepinder Sidhu Maryland Center for Telecommunications Research

More information

Welch Allyn Connex, VitalsLink by Cerner, and Connex CSK Network installation. Best practices overview

Welch Allyn Connex, VitalsLink by Cerner, and Connex CSK Network installation. Best practices overview Welch Allyn Connex, VitalsLink by Cerner, and Connex CSK Network installation Best practices overview ii Welch Allyn Network installation 2015 Welch Allyn. All rights are reserved. To support the intended

More information

Troubleshooting Problems Affecting Radio Frequency Communication

Troubleshooting Problems Affecting Radio Frequency Communication Troubleshooting Problems Affecting Radio Frequency Communication Document ID: 8630 Refer to the Cisco Wireless Downloads (registered customers only) page in order to get Cisco Aironet drivers, firmware

More information

Troubleshooting Common Issues in VoIP

Troubleshooting Common Issues in VoIP Troubleshooting Common Issues in VoIP 2014, SolarWinds Worldwide, LLC. All rights reserved. Voice over Internet Protocol (VoIP) Introduction Voice over IP, or VoIP, refers to the delivery of voice and

More information

Chapter 3 ATM and Multimedia Traffic

Chapter 3 ATM and Multimedia Traffic In the middle of the 1980, the telecommunications world started the design of a network technology that could act as a great unifier to support all digital services, including low-speed telephony and very

More information

Quality of Service Analysis of site to site for IPSec VPNs for realtime multimedia traffic.

Quality of Service Analysis of site to site for IPSec VPNs for realtime multimedia traffic. Quality of Service Analysis of site to site for IPSec VPNs for realtime multimedia traffic. A Network and Data Link Layer infrastructure Design to Improve QoS in Voice and video Traffic Jesús Arturo Pérez,

More information

Experimental Analysis of VoIP over Wireless Local Area Networks

Experimental Analysis of VoIP over Wireless Local Area Networks JOURNAL OF COMMUNICATIONS, VOL. 2, NO., JUNE 27 3 Experimental Analysis of VoIP over Wireless Local Area Networks Abderrahmane Lakas UAE University, CIT, Al Ain, UAE Email: alakas@uaeu.ac.ae Mohammed Boulmalf

More information

VoIP in 802.11. Mika Nupponen. S-72.333 Postgraduate Course in Radio Communications 06/04/2004 1

VoIP in 802.11. Mika Nupponen. S-72.333 Postgraduate Course in Radio Communications 06/04/2004 1 VoIP in 802.11 Mika Nupponen S-72.333 Postgraduate Course in Radio Communications 06/04/2004 1 Contents Introduction VoIP & WLAN Admission Control for VoIP Traffic in WLAN Voice services in IEEE 802.11

More information

REPORT ITU-R M.2134. Requirements related to technical performance for IMT-Advanced radio interface(s)

REPORT ITU-R M.2134. Requirements related to technical performance for IMT-Advanced radio interface(s) Rep. ITU-R M.2134 1 REPORT ITU-R M.2134 Requirements related to technical performance for IMT-Advanced radio interface(s) (2008) TABLE OF CONTENTS... Page 1 Introduction... 2 2 Scope and purpose... 2 3

More information

A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks

A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks 1 A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks Yang Song, Bogdan Ciubotaru, Member, IEEE, and Gabriel-Miro Muntean, Member, IEEE Abstract Limited battery capacity

More information

An Accurate Technique for Measuring the Wireless Side of Wireless Networks

An Accurate Technique for Measuring the Wireless Side of Wireless Networks An Accurate Technique for Measuring the Wireless Side of Wireless Networks Jihwang Yeo, Moustafa Youssef, Tristan Henderson, Ashok Agrawala Department of Computer Science, University of Maryland, College

More information

Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks

Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks 1 Mr. Praveen S Patil, 2 Mr. Rabinarayan Panda, 3 Mr. Sunil Kumar R D 1,2,3 Asst. Professor, Department of MCA, The Oxford College of Engineering,

More information

15-441: Computer Networks Homework 2 Solution

15-441: Computer Networks Homework 2 Solution 5-44: omputer Networks Homework 2 Solution Assigned: September 25, 2002. Due: October 7, 2002 in class. In this homework you will test your understanding of the TP concepts taught in class including flow

More information

Network Discovery Protocol LLDP and LLDP- MED

Network Discovery Protocol LLDP and LLDP- MED Network LLDP and LLDP- MED Prof. Vahida Z. Attar College of Engineering, Pune Wellesely Road, Shivajinagar, Pune-411 005. Maharashtra, INDIA Piyush chandwadkar College of Engineering, Pune Wellesely Road,

More information

LOHAS: LOad balancing with fast HAndoff Scheme on smartphones over IEEE 802.11 WLANs

LOHAS: LOad balancing with fast HAndoff Scheme on smartphones over IEEE 802.11 WLANs LOHAS: LOad balancing with fast HAndoff Scheme on smartphones over IEEE 802.11 WLANs Seungmin Kim Advanced Institute of soonsm@kaist.ac.kr Yohaan Yoon Advanced Institute of straightfor@kaist.ac.kr Myungchul

More information

Network Discovery Protocol LLDP and LLDP- MED

Network Discovery Protocol LLDP and LLDP- MED Network LLDP and LLDP- MED Prof. Vahida Z. Attar College of Engineering, Pune Wellesely Road, Shivajinagar, Pune-411 005. Maharashtra, INDIA Piyush chandwadkar College of Engineering, Pune Wellesely Road,

More information

Analysis of Methods for Mobile Device Tracking. David Nix Chief Scientific Advisor

Analysis of Methods for Mobile Device Tracking. David Nix Chief Scientific Advisor Analysis of Methods for Mobile Device Tracking David Nix Chief Scientific Advisor October 2013 Table of Contents 1. Document Purpose and Scope 3 2. Overview 3 2.1 Mobile Device Penetration 3 2.2 Mobile

More information

Wireless LAN advantages. Wireless LAN. Wireless LAN disadvantages. Wireless LAN disadvantages WLAN:

Wireless LAN advantages. Wireless LAN. Wireless LAN disadvantages. Wireless LAN disadvantages WLAN: WLAN: Wireless LAN Make use of a wireless transmission medium Tipically restricted in their diameter: buildings, campus, single room etc.. The global goal is to replace office cabling and to introduce

More information

Influence of Load Balancing on Quality of Real Time Data Transmission*

Influence of Load Balancing on Quality of Real Time Data Transmission* SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 6, No. 3, December 2009, 515-524 UDK: 004.738.2 Influence of Load Balancing on Quality of Real Time Data Transmission* Nataša Maksić 1,a, Petar Knežević 2,

More information

Lecture Objectives. Lecture 07 Mobile Networks: TCP in Wireless Networks. Agenda. TCP Flow Control. Flow Control Can Limit Throughput (1)

Lecture Objectives. Lecture 07 Mobile Networks: TCP in Wireless Networks. Agenda. TCP Flow Control. Flow Control Can Limit Throughput (1) Lecture Objectives Wireless and Mobile Systems Design Lecture 07 Mobile Networks: TCP in Wireless Networks Describe TCP s flow control mechanism Describe operation of TCP Reno and TCP Vegas, including

More information

Virtualization for Load Balancing on IEEE 802.11 Networks

Virtualization for Load Balancing on IEEE 802.11 Networks Virtualization for Load Balancing on IEEE 802.11 Networks Tibério M. de Oliveira 1, Marcel W. R. da Silva, Kleber V. Cardoso 2, and José Ferreira de Rezende 1 1 Universidade Federal do Rio de Janeiro -

More information

Measuring Data and VoIP Traffic in WiMAX Networks

Measuring Data and VoIP Traffic in WiMAX Networks JOURNAL OF TELECOMMUNICATIONS, VOLUME 2, ISSUE 1, APRIL 2010 Measuring Data and VoIP Traffic in WiMAX Networks 1 Iwan Adhicandra Abstract Due to its large coverage area, low cost of deployment and high

More information

NQA Technology White Paper

NQA Technology White Paper NQA Technology White Paper Keywords: NQA, test, probe, collaboration, scheduling Abstract: Network Quality Analyzer (NQA) is a network performance probe and statistics technology used to collect statistics

More information

Optimization of VoIP over 802.11e EDCA based on synchronized time

Optimization of VoIP over 802.11e EDCA based on synchronized time Optimization of VoIP over 802.11e EDCA based on synchronized time Padraig O Flaithearta, Dr. Hugh Melvin Discipline of Information Technology, College of Engineering and Informatics, National University

More information

ROGUE ACCESS POINT DETECTION: AUTOMATICALLY DETECT AND MANAGE WIRELESS THREATS TO YOUR NETWORK

ROGUE ACCESS POINT DETECTION: AUTOMATICALLY DETECT AND MANAGE WIRELESS THREATS TO YOUR NETWORK ROGUE ACCESS POINT DETECTION: AUTOMATICALLY DETECT AND MANAGE WIRELESS THREATS TO YOUR NETWORK The Rogue Access Point Problem One of the most challenging security concerns for IT managers today is the

More information

Wireless Mesh Networks under FreeBSD

Wireless Mesh Networks under FreeBSD Wireless Networks under FreeBSD Rui Paulo rpaulo@freebsd.org The FreeBSD Project AsiaBSDCon 2010 - Tokyo, Japan Abstract With the advent of low cost wireless chipsets, wireless mesh networks became much

More information

ENSC 427: Communication Networks. Analysis of Voice over IP performance on Wi-Fi networks

ENSC 427: Communication Networks. Analysis of Voice over IP performance on Wi-Fi networks ENSC 427: Communication Networks Spring 2010 OPNET Final Project Analysis of Voice over IP performance on Wi-Fi networks Group 14 members: Farzad Abasi (faa6@sfu.ca) Ehsan Arman (eaa14@sfu.ca) http://www.sfu.ca/~faa6

More information

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc (International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan dr.khalidbilal@hotmail.com

More information

Ring Local Area Network. Ring LANs

Ring Local Area Network. Ring LANs Ring Local Area Network Ring interface (1-bit buffer) Ring interface To station From station Ring LANs The ring is a series of bit repeaters, each connected by a unidirectional transmission link All arriving

More information

TDM services over IP networks

TDM services over IP networks Keyur Parikh Junius Kim TDM services over IP networks 1. ABSTRACT Time Division Multiplexing (TDM) circuits have been the backbone of communications over the past several decades. These circuits which

More information

Express Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh

Express Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh Express Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh, Ph.D. benveniste@ieee.org Mesh 2008, Cap Esterel, France 1 Abstract Abundant hidden node collisions and correlated channel access

More information

Spring 2014. Final Project Report

Spring 2014. Final Project Report ENSC 427: COMMUNICATIONNETWORKS Spring 2014 Final Project Report Evaluation and Comparison of WiMAX (802.16a) and Wi-Fi (802.11a) http://www.sfu.ca/~tlan/ensc427webpage.html Group #11 Tian Lan tlan@sfu.ca

More information

Wireless Mobility Management with Prediction, Delay Reduction and Resource Management in 802.11 Networks

Wireless Mobility Management with Prediction, Delay Reduction and Resource Management in 802.11 Networks Wireless Mobility Management with Prediction, Delay Reduction and Resource Management in 802. Networks Biju Issac, Member, IAENG, Khairuddin Hamid, and C. E. Tan Abstract In 802. wireless infrastructure

More information

Unlicensed Mobile Access (UMA) Handover and Packet Data Performance Analysis

Unlicensed Mobile Access (UMA) Handover and Packet Data Performance Analysis Unlicensed Mobile Access (UMA) Handover and Packet Data Performance Analysis Andres Arjona Nokia Siemens Networks andres.arjona@nsn.com Hannu Verkasalo Helsinki University of Technology hannu.verkasalo@tkk.fi

More information

Rohde & Schwarz R&S SITLine ETH VLAN Encryption Device Functionality & Performance Tests

Rohde & Schwarz R&S SITLine ETH VLAN Encryption Device Functionality & Performance Tests Rohde & Schwarz R&S Encryption Device Functionality & Performance Tests Introduction Following to our test of the Rohde & Schwarz ETH encryption device in April 28 the European Advanced Networking Test

More information

Evaluating Wireless Broadband Gateways for Deployment by Service Provider Customers

Evaluating Wireless Broadband Gateways for Deployment by Service Provider Customers Evaluating Wireless Broadband Gateways for Deployment by Service Provider Customers Overview A leading provider of voice, video, and data services to the residential and businesses communities designed

More information